Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Hardware reverse engineering: Overview and open challenges

M Fyrbiak, S Strauß, C Kison, S Wallat… - 2017 IEEE 2nd …, 2017 - ieeexplore.ieee.org
Hardware reverse engineering is a universal tool for both legitimate and illegitimate
purposes. On the one hand, it supports confirmation of IP infringement and detection of …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …

Logic design within memristive memories using memristor-aided loGIC (MAGIC)

N Talati, S Gupta, P Mane… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Realizing logic operations within passive crossbar memory arrays is a promising approach
to enable novel computer architectures, different from conventional von Neumann …

Removal attacks on logic locking and camouflaging techniques

M Yasin, B Mazumdar, O Sinanoglu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the adoption of a globalized and distributed IC design flow, IP piracy, reverse
engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation …

The EPFL combinational benchmark suite

L Amarú, PE Gaillardon… - Proceedings of the 24th …, 2015 - infoscience.epfl.ch
In this paper, we present the EPFL combinational benchmark suite. We aim at completing
existing benchmark suites by focusing only on natively combinational benchmarks. The …

Security analysis of integrated circuit camouflaging

J Rajendran, M Sam, O Sinanoglu, R Karri - Proceedings of the 2013 …, 2013 - dl.acm.org
Camouflaging is a layout-level technique that hampers an attacker from reverse engineering
by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real …

A survey on chip to system reverse engineering

SE Quadir, J Chen, D Forte, N Asadizanjani… - ACM journal on …, 2016 - dl.acm.org
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …

Spontaneous evolution of modularity and network motifs

N Kashtan, U Alon - … of the National Academy of Sciences, 2005 - National Acad Sciences
Biological networks have an inherent simplicity: they are modular with a design that can be
separated into units that perform almost independently. Furthermore, they show reuse of …